Chapter 064 Domain Name Hijacking
In 1998, the fourth year of China's full access to the Internet, with the support of the state and the encouragement of public opinion, China's Internet development was in the initial stage of rapid development.
The construction of a number of national basic backbone networks such as education network, science and technology network, business golden bridge network, public information network has been initially completed, involving all walks of life, various types of websites have sprung up like mushrooms after a rain, changing with each passing day, and the number of netizens is also showing a blowout increase, and the Internet has begun to enter the general public, becoming an increasingly important way for ordinary people to obtain information from the outside world, communicate with the outside world, or a way of leisure and entertainment.
Jiangzhou, as an international metropolis, is at the forefront of China in terms of computer development, and the level of Internet infrastructure and the number of Internet users are much higher than those in other places in China, while Nanzhou, as an important city in the economic development region centered on Jiangzhou, has always followed the pace of Jiangzhou and is at the leading level in the country.
On the eve of the National Day, on a very ordinary weekend, people ushered in the sun in the east and began their daily lives, of course, there were also overtime workers at work, however, it was on this day that a storm from the Internet was quietly brewing initiated by one person.
At noon on this day, countless netizens in Nanzhou sat in front of the computer as usual, opened the browser, browsed the online information, or poured water in the forum, or chatted and farted with distant friends in a chat room, at twelve o'clock, a considerable part of the computers connected to the Internet suddenly disconnected for a minute, when the network was connected again, no matter what web page was loaded, the browser would be located to a new page composed of a mess of garbled characters, the list of black characters on a white background of this web page, the content of the list is shocking, It quickly attracted people's attention.
List of crime facts of the chairman of the Jinlin Hotel in Nanzhou City Chi Lin and his son Chi Xiang, which is the title of this page.
In this list, there are many criminal facts of Chi Lin and his son Chi Xiang, such as money laundering, drug trafficking, hired murderers, forcing women to sell yin, stealing confidential documents of government agencies, and a series of criminal evidence, each of which is followed by a large number of specific evidence, such as the account turnover process of money laundering and bank account details, the specific date and place of drug trafficking, the list of hired homicide victims, the list of confidential documents stolen from government agencies, and so on.
At the end of the document, the name of the publisher of the information is signed: feonix.
At the beginning, ordinary netizens found this web page, saw this information, thought that the computer was poisoned, some people began to ask for help from the computer masters around them, and the people in the unit began to ask for help from the technical personnel of their units to ......, but soon, people found that this is not an isolated phenomenon, almost all the computers around them are like this, no matter what web page they open, they can only show the list of incriminating evidence above.
So some people started calling telecommunications bureaus, network service providers (ISPs), some started calling computer security companies, and some even thought of calling the police......
In short, within a few minutes after this incident, it swept through the Internet in Jiangzhou and Nanzhou like a storm, and quickly spread outside the network, ordinary netizens waited anxiously, discussed a lot, ISPs were busy, network security companies were busy, the police were busy because they received people's alarms, and some media, including TV stations, were also sensitive to the extraordinary situation of this incident and acted quickly......
Of course, there are some hackers hidden behind the network, or many network technology experts, enthusiasts are excited, of course, they are more concerned about who Feonix is and the technical means he uses......
As a mass network incident covering the whole city, the incident quickly attracted the attention of the local telecommunications bureau, and a few minutes after the incident, a technical team conducted an urgent discussion on the matter, and soon came to the conclusion that the name server (DNS) of Nanzhou City was hijacked.
The so-called name server, in the network plays a role similar to a translator, we usually access the network of websites and other resources, often only need to enter a URL to the browser address bar, for example, you can access the website, but in the network, all servers are used IP address as a unique address identification, so similar to this URL can not be directly located to the specific network server, then, we need a special translation agency, Translate it into the IP address of the web server where the URL is located, then the domain name server will do the job.
The name server saves a table, the former item of this table is the URL, and the latter item is the server IP address corresponding to the URL, and the name server finds the server IP address corresponding to a URL by looking up this table.
Xiao Yuan wanted everyone to see the list of facts about the crimes of Chi Lin and his son, and all he needed to do was to hack into the DNS server and change all the last IP addresses in the domain name mapping table in the DNS server to a fixed IP, and this IP pointed to a server that stored a page he had designed in advance.
After the conclusion was reached, the technical team naturally started to act immediately, maintaining the name server, and striving to restore the network to normal as soon as possible, but what made the technicians depressed was that the name server was completely unfamiliar with a virus, and this virus was very deeply hidden, whether it was antivirus software or manual antivirus, no trace of this virus could be found, but when they tried to recover the DNS mapping table, the virus would appear, and the DNS mapping table was modified again. It was relocated to a server set up in a foreign country, and there was only one page on this server, which was the guilty table of the Chi Lin father and son.
What made the technicians vomit blood even more was that they were kicked out of the system after they tried to recover the DNS map table three times in a row, and when they wanted to enter the system again, the original administrator password was invalid, and a warning window popped up on the login screen, in which feonix warned them not to try to modify the DNS map table again, otherwise the DNS map table would be completely destroyed, and also reminded them that they should pay more attention to the crimes of Chi Lin and his son, as long as Chi Lin and his son were ambushed, then everything in the network would return to normal.
After waiting for the network to return to normal for a long time, ordinary people complained in their hearts on the one hand, and on the other hand, most of them began to focus on the list of crimes against the Chi Lin father and son.
Who is Feonix? What exactly did he use to make this information visible to everyone? Why did he post this information? Is the information he listed true? Where does this information come from? Where did the original website on the web go? All these series of problems are quickly fermenting in the minds of the people, and they are also waiting for the official to come out with a reasonable explanation of this matter.